-
1
-
-
77950347409
-
A View of Cloud Computing
-
April
-
M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, "A View of Cloud Computing," Communications of the ACM, vol. 53, no. 4, pp. 50-58, April 2010.
-
(2010)
Communications of the ACM
, vol.53
, Issue.4
, pp. 50-58
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.H.5
Konwinski, A.6
Lee, G.7
Patterson, D.A.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
2
-
-
74049102823
-
Provable Data Possession at Untrusted Stores
-
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, "Provable Data Possession at Untrusted Stores," in the Proceedings of ACM CCS 2007, 2007, pp. 598-610.
-
(2007)
The Proceedings of ACM CCS 2007
, pp. 598-610
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
3
-
-
84872270487
-
-
June [Online]. Available
-
(2011, June) Yesterday's Authentication Bug. [Online]. Available: http://blog.dropbox.com/index.php/yesterdays-authentication-bug/
-
(2011)
Yesterday's Authentication Bug
-
-
-
5
-
-
70449569012
-
Ensuring Data Storage Security in Cloud Computing
-
C. Wang, Q. Wang, K. Ren, and W. Lou, "Ensuring Data Storage Security in Cloud Computing," in the Proceedings of IEEE/ACM IWQoS 2009, 2009, pp. 1-9.
-
(2009)
The Proceedings of IEEE/ACM IWQoS 2009
, pp. 1-9
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
6
-
-
70350389843
-
Enabling Public Verifiability and Data Dynamic for Storage Security in Cloud Computing
-
Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, "Enabling Public Verifiability and Data Dynamic for Storage Security in Cloud Computing," in the Proceedings of ESORICS 2009, 2009, pp. 355-370.
-
(2009)
The Proceedings of ESORICS 2009
, pp. 355-370
-
-
Wang, Q.1
Wang, C.2
Li, J.3
Ren, K.4
Lou, W.5
-
7
-
-
74049121230
-
Dynamic Provable Data Possession
-
C. Erway, A. Kupcu, C. Papamanthou, and R. Tamassia, "Dynamic Provable Data Possession," in the Proceedings of ACM CCS 2009, 2009, pp. 213-222.
-
(2009)
The Proceedings of ACM CCS 2009
, pp. 213-222
-
-
Erway, C.1
Kupcu, A.2
Papamanthou, C.3
Tamassia, R.4
-
8
-
-
77953295132
-
Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing
-
C. Wang, Q. Wang, K. Ren, and W. Lou, "Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing," in the Proceedings of IEEE INFOCOM 2010, 2010, pp. 525-533.
-
(2010)
The Proceedings of IEEE INFOCOM 2010
, pp. 525-533
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
9
-
-
78650081896
-
Remote Data Checking for Network Coding-based Distributed Stroage Systems
-
B. Chen, R. Curtmola, G. Ateniese, and R. Burns, "Remote Data Checking for Network Coding-based Distributed Stroage Systems," in the Proceedings of ACM CCSW 2010, 2010, pp. 31-42.
-
(2010)
The Proceedings of ACM CCSW 2010
, pp. 31-42
-
-
Chen, B.1
Curtmola, R.2
Ateniese, G.3
Burns, R.4
-
10
-
-
79959325063
-
Dynamic Audit Services for Integrity Verification of Outsourced Storage in Clouds
-
Y. Zhu, H. Wang, Z. Hu, G.-J. Ahn, H. Hu, and S. S.Yau, "Dynamic Audit Services for Integrity Verification of Outsourced Storage in Clouds," in the Proceedings of ACM SAC 2011, 2011, pp. 1550-1557.
-
(2011)
The Proceedings of ACM SAC 2011
, pp. 1550-1557
-
-
Zhu, Y.1
Wang, H.2
Hu, Z.3
Ahn, G.-J.4
Hu, H.5
Yau, S.S.6
-
11
-
-
84861630520
-
LT Codes-based Secure and Reliable Cloud Storage Service
-
N. Cao, S. Yu, Z. Yang, W. Lou, and Y. T. Hou, "LT Codes-based Secure and Reliable Cloud Storage Service," in the Proceedings of IEEE INFOCOM 2012, 2012, pp. 693-701.
-
(2012)
The Proceedings of IEEE INFOCOM 2012
, pp. 693-701
-
-
Cao, N.1
Yu, S.2
Yang, Z.3
Lou, W.4
Hou, Y.T.5
-
12
-
-
84866761388
-
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
-
B. Wang, B. Li, and H. Li, "Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud," in the Proceedings of IEEE Cloud 2012, 2012, pp. 295-302.
-
(2012)
The Proceedings of IEEE Cloud 2012
, pp. 295-302
-
-
Wang, B.1
Li, B.2
Li, H.3
-
13
-
-
84873677485
-
New Approaches to Security and Availability for Cloud Data
-
A. Juels and A. Oprea, "New Approaches to Security and Availability for Cloud Data," Communications of the ACM, vol. 56, no. 2, pp. 64-73, 2013.
-
(2013)
Communications of the ACM
, vol.56
, Issue.2
, pp. 64-73
-
-
Juels, A.1
Oprea, A.2
-
14
-
-
84883057189
-
Public Auditing for Shared Data with Efficient User Revoation in the Cloud
-
B.Wang, B. Li, and H. Li, "Public Auditing for Shared Data with Efficient User Revoation in the Cloud," in the Proceedings of IEEE INFOCOM 2013, 2013, pp. 2904-2912.
-
(2013)
The Proceedings of IEEE INFOCOM 2013
, pp. 2904-2912
-
-
Wang, B.1
Li, B.2
Li, H.3
-
15
-
-
84891354182
-
Privacy-Preserving Public Auditing for Shared Cloud Data Supporting Group Dynamics
-
B. Wang, H. Li, and M. Li, "Privacy-Preserving Public Auditing for Shared Cloud Data Supporting Group Dynamics," in the Proceedings of IEEE ICC 2013, 2013, pp. 539-543.
-
(2013)
The Proceedings of IEEE ICC 2013
, pp. 539-543
-
-
Wang, B.1
Li, H.2
Li, M.3
-
16
-
-
84893341393
-
Storing Shared Data on the Cloud via Security-Mediator
-
B. Wang, S. S. Chow, M. Li, and H. Li, "Storing Shared Data on the Cloud via Security-Mediator," in the Proceedings of ICDCS 2013, 2013, pp. 124-133.
-
(2013)
The Proceedings of ICDCS 2013
, pp. 124-133
-
-
Wang, B.1
Chow, S.S.2
Li, M.3
Li, H.4
-
17
-
-
0034581037
-
Ten risks of PKI: What you're not being told about public key infrastructure
-
C. Ellison and B. Schneier, "Ten Risks of PKI: What You're Not Being Told About Public Key Infrastructure," Computer Security Journal, vol. 16, no. 1, pp. 1-7, 2000. (Pubitemid 30565287)
-
(2000)
Computer Security Journal
, vol.16
, Issue.1
, pp. 1-7
-
-
Ellison, C.1
Schneier, B.2
-
18
-
-
0036684150
-
PKI: It's Not Dead, Just Resting
-
DOI 10.1109/MC.2002.1023787
-
P. Gutmann, "PKI: It's Not Dead, Just Resting," IEEE Computer, vol. 35, no. 8, pp. 41-49, 2002. (Pubitemid 34950479)
-
(2002)
Computer
, vol.35
, Issue.8
, pp. 41-49
-
-
Gutmann, P.1
-
20
-
-
70249129465
-
Scalable and Efficient Provable Data Possession
-
G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, "Scalable and Efficient Provable Data Possession," in the Prceedings of SecureComm 2008, 2008.
-
(2008)
The Prceedings of SecureComm 2008
-
-
Ateniese, G.1
Pietro, R.D.2
Mancini, L.V.3
Tsudik, G.4
-
22
-
-
85020598353
-
Identity-based Cryptosystems and Signature Schemes
-
Springer-Verlag
-
A. Shamir, "Identity-based Cryptosystems and Signature Schemes," in the Proceedings of CRYPTO'84 . Springer-Verlag, 1984, pp.47-53.
-
(1984)
The Proceedings of CRYPTO'84
, pp. 47-53
-
-
Shamir, A.1
-
23
-
-
35248844436
-
An Identity-Based Signature from Gap Diffie-Hellman Groups
-
Springer-Verlag
-
J. C. Cha and J. H. Cheon, "An Identity-Based Signature from Gap Diffie-Hellman Groups," in the Proceedings of PKC 2003. Springer-Verlag, 2003, pp. 18-30.
-
(2003)
The Proceedings of PKC 2003
, pp. 18-30
-
-
Cha, J.C.1
Cheon, J.H.2
-
24
-
-
33744786523
-
On the Security of Certificateless Signature Schemes from Asiacrypt 2003
-
Springer-Verlag
-
X. Huang, W. Susilo, Y. Mu, and F. Zhang, "On the Security of Certificateless Signature Schemes from Asiacrypt 2003," in the Proceedings of CANS 2005. Springer-Verlag, 2005, pp. 13-25.
-
(2005)
The Proceedings of CANS 2005
, pp. 13-25
-
-
Huang, X.1
Susilo, W.2
Mu, Y.3
Zhang, F.4
-
25
-
-
33746591632
-
Certificateless Public-Key Signature: Security Model and Efficient Construction
-
Springer-Verlag
-
Z. Zhang, D. S. Wong, J. Xu, and D. Feng, "Certificateless Public-Key Signature: Security Model and Efficient Construction," in the Proceedings of ACNS 2006. Springer-Verlag, 2006, pp. 293-308.
-
(2006)
The Proceedings of ACNS 2006
, pp. 293-308
-
-
Zhang, Z.1
Wong, D.S.2
Xu, J.3
Feng, D.4
-
26
-
-
61849086789
-
A New Certificateless Aggregate Signature Scheme
-
L. Zhang and F. Zhang, "A New Certificateless Aggregate Signature Scheme," Computer Communications, vol. 32, no. 6, pp. 1079-1085, 2009.
-
(2009)
Computer Communications
, vol.32
, Issue.6
, pp. 1079-1085
-
-
Zhang, L.1
Zhang, F.2
-
27
-
-
84893548654
-
-
Utah State University, Tech. Rep.
-
B. Wang, Y. Hou, M. Li, H. Wang, and H. Li, "Privacy-Preserving Multi-Dimensional Range Search over Encrypted Cloud Data within Sublinear Time," Utah State University, Tech. Rep., 2013.
-
(2013)
Privacy-Preserving Multi-Dimensional Range Search over Encrypted Cloud Data Within Sublinear Time
-
-
Wang, B.1
Hou, Y.2
Li, M.3
Wang, H.4
Li, H.5
-
28
-
-
84872004857
-
CL-PRE: A Certificateless Proxy Re-Encryption Scheme for Secure Data Sharing with Public Cloud
-
L. Xu, X. Wu, and X. Zhang, "CL-PRE: a Certificateless Proxy Re-Encryption Scheme for Secure Data Sharing with Public Cloud," in the Proceedings of ACM ASIACCS 2012, 2012.
-
(2012)
The Proceedings of ACM ASIACCS 2012
-
-
Xu, L.1
Wu, X.2
Zhang, X.3
-
29
-
-
84863472230
-
Knox: Privacy-Preserving Auditing for Shared Data with Large Groups in the Cloud
-
Springer-Verlag, June
-
B.Wang, B. Li, and H. Li, "Knox: Privacy-Preserving Auditing for Shared Data with Large Groups in the Cloud," in the Proceedings of ACNS 2012. Springer-Verlag, June 2012, pp. 507-525.
-
(2012)
The Proceedings of ACNS 2012
, pp. 507-525
-
-
Wang, B.1
Li, B.2
Li, H.3
|